Question

In: Computer Science

ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words,...

ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan

Instructions: In NO LESS than 200 words, answer the following question.

Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations.

For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual security policy from a company; however, ORIGINAL WORK IS A MUST.

The following are suggestions of items to consider as key parts of a security policy:

Threat

Policy statement

Responsibilities

Guidelines and user procedure

Information technology procedures

Compliance and enforcement

Solutions

Expert Solution

Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations.

We used network access control to control who or what has authorised persmission to access network.Permission can be for users as well for device also.The NAC network intercepts the connection requests, which are then authenticated against a designated identity and access management system. Access is either accepted or denied based on a pre-determined set of parameters and policies that are programmed into the system.

Information security is deemed to safeguard three main objectives:

Confidentiality – data and information assets must be confined to people authorized to access and not be disclosed to others;
Integrity – keeping the data intact, complete and accurate, and IT systems operational;
Availability – an objective indicating that information or system is at disposal of authorized users when needed.


For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual security policy from a company; however, ORIGINAL WORK IS A MUST.

The following are suggestions of items to consider as key parts of a security policy:

Threat: There can be threat from third party for security reason. Like recently we can ransomware threat where attacker stole or encrypt our file and demand for money to give back files or decrypt them.

Policy statement: There can be a vast area of security policies so we should have a set of policies to govern users and devices connecting to the network based on specific situations such as user profile, device type or user location.

Responsibilities: We should appoint someone who can compliance these securities on employees. He should maaintain that all are following security procedure which includes maintaince of data confidentiality and data integrity.If some one fail to follow these procedure then he should take disciplinary action against them.


Guidelines and user procedure: There should be set of user procedure and guildlines to follow all the intranet users and fail to do so will result in disciplary action.

Information technology procedures: There should Information technical procedure set by network administrator for applying these procedure.

Compliance and enforcement: All compilance should to enforce to the user for setup of securities.


Related Solutions

Audits and Compliance / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer...
Audits and Compliance / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer the following question. Compare and contrast audits and assessments. •Pick at least 3 things that are the same and 3 things that are different. •Compare the goals, the timing, and the roles that are involved.
Implementation, Operations, and Monitoring / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words,...
Implementation, Operations, and Monitoring / Enterprise Security Strategy Plan Instructions: In NO LESS than 400 words, answer the following question. Regarding the implementation of a security plan, this can be anything from the organizational change management aspects (users) or the technical implementation (information technology staff),Select 2 key areas to either engage in the normal, everyday operations of a security team, or 2 key areas to monitor, and why. Describe and evaluate each key area. 200 words requirement for each.
E-MAIL Security Policies / Enterprise Security StrategyPlanInstructions: In NO LESSthan 200 words, answer...
E-MAIL Security Policies / Enterprise Security Strategy PlanInstructions: In NO LESS than 200 words, answer the following question.Create an outline that could serve as a template for creating future security policies for an IT Network's E-MAIL functionality. Your template should reflect 2–3 key parts of a security policy related to intranet operations.For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from...
APPLICATION Security Policies / Enterprise SecurityStrategy PlanInstructions: In NO LESSthan 200 words, answer...
APPLICATION Security Policies / Enterprise Security Strategy PlanInstructions: In NO LESS than 200 words, answer the following question.Create an outline that could serve as a template for creating future security policies for an IT Network's Applications. Your template should reflect2–3 key parts of a security policy related to intranet operations.For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from an actual...
INTERNET USE Security Policies / Enterprise SecurityStrategy PlanInstructions: In NO LESSthan 200 words,...
INTERNET USE Security Policies / Enterprise Security Strategy PlanInstructions: In NO LESS than 200 words, answer the following question.Create an outline that could serve as a template for creating future security policies for an IT Network's Internet Use. Your template should reflect2–3 key parts of a security policy related to intranet operations.For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want to borrow elements from...
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls.
Security Mitigation Plan discuss the following Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine authentication strategy. Determine intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures. Develop education plan for employees on security protocols and appropriate use. Provide risk response. Avoidance Transference Mitigation Acceptance Address change Management/Version Control. Outline acceptable use of organizational assets and data. Present employee policies (separation of duties/training). Explain incident response. Incident types/category definitions Roles and responsibilities Reporting requirements/escalation Cyber-incident response...
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls....
Research and include the following: Security Risk Mitigation Plan: Select and document security policies and controls. Create password policies. Document administrator roles and responsibilities. Document user roles and responsibilities. Determine an authentication strategy. Determine an intrusion detection and monitoring strategy. Determine virus detection strategies and protection. Create auditing policies and procedures.
In no than less than 200 words, explain a package policy and the advantages of a...
In no than less than 200 words, explain a package policy and the advantages of a commercial package policy to a business frim as compared to the purchase of separate policies.
In no than less than 200 words, describe the major characteristics of a physicians, surgeons, and...
In no than less than 200 words, describe the major characteristics of a physicians, surgeons, and dentists professional liability insurance policy.
In no than less than 200 words, what are factors that affect the expected rate of...
In no than less than 200 words, what are factors that affect the expected rate of return for holders of debt and equity?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT